MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 56e1702bf2144b3d380c778ac722fca6854f8794c8adefd19a5c0ed4091db499. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 6
| SHA256 hash: | 56e1702bf2144b3d380c778ac722fca6854f8794c8adefd19a5c0ed4091db499 |
|---|---|
| SHA3-384 hash: | a0412854fbd5346a495f869a941ea21cca7781f25d2e24c63159b37e75355940b23a5f52e8cc81806f38f8d7e5f7980a |
| SHA1 hash: | 4794afb417405b5c475593c21fa3ee9c3dc6808a |
| MD5 hash: | 3ea49df84a80eb88c10d6d4a5b518e61 |
| humanhash: | london-lamp-mango-charlie |
| File name: | Banktelex07102020#pdf.exe |
| Download: | download sample |
| File size: | 241'664 bytes |
| First seen: | 2020-10-19 10:47:06 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 6144:Nj9ZKh2WP9wzR3qXoILXGrtI1I4wP0Gn1Ih84mOfZX9sceSM0+D:R9EJ9wt2L2C1Iz0i1h4L9c |
| Threatray | 310 similar samples on MalwareBazaar |
| TLSH | 0B3423EC4ACD8BA6D86D57F3D0A360164052A5AA9A03CF3F26C172485F67327B53137B |
| Reporter | |
| Tags: | exe Yahoo |
abuse_ch
Malspam distributing unidentified malware:HELO: sonic310-37.consmr.mail.ir2.yahoo.com
Sending IP: 77.238.177.58
From: Very !mportant????! <gabevvarna01@yahoo.com>
Subject: Fw: Bank Account Error
Attachment: Banktelex07102020pdf.rar (contains "Banktelex07102020#pdf.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a window
Running batch commands
Launching a process
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
.NET source code contains very large array initializations
Creates an autostart registry key pointing to binary in C:\Windows
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Add file from suspicious location to autostart registry
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Witch
Status:
Malicious
First seen:
2020-10-19 06:58:43 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 300 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
56e1702bf2144b3d380c778ac722fca6854f8794c8adefd19a5c0ed4091db499
MD5 hash:
3ea49df84a80eb88c10d6d4a5b518e61
SHA1 hash:
4794afb417405b5c475593c21fa3ee9c3dc6808a
SH256 hash:
27f290f62b69459fd550f4472b6897dd510c97af159745256d8bd10e8bf5d69e
MD5 hash:
6c6123eb24f7b97a45e19e8b942c6bb6
SHA1 hash:
3185b1ed260650a6013670f9879819eb3ec1be02
SH256 hash:
19d9922060be89a70b76e5c0056e751f1baa5d41819235c92cf4f5d7668e1267
MD5 hash:
811864a0b06c529af894a7fec6ddbf47
SHA1 hash:
d35b82933eb06a6ec60e8cbbdb65eb6cdcaeb6d2
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
exe 56e1702bf2144b3d380c778ac722fca6854f8794c8adefd19a5c0ed4091db499
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.